A method for checking and updating the ownership of outsourced data based on alliance chain
A technology for outsourcing data and data owners, applied in the field of information security, to resist tampering attacks, avoid low scalability, and eliminate mutual distrust
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] The present invention is further described below in conjunction with the accompanying drawings and embodiments.
[0042] This embodiment provides ownership check and update the program data based on the league outsourcing chain, such as its program flowchart figure 1 As shown in Class 4 stakeholders: the data owner, service node, auditors, block creator;
[0043] The flowchart figure 2 , Includes seven algorithm:
[0044] initialization:
[0045] Selecting a secure hash function h according to the security parameters, data owner run the initialization algorithm: {0,1} * → G, a bilinear map e: G × G → G T , Two pseudo-random function with A random number as a private key s random numbers α 1 α 2 , ..., α s ∈G, calculates secret key sk and the corresponding public key pk = g sk ∈G, wherein, G, G T Are group, q is the order of G, g is a member of the G of the green, Q is a cyclic group of order.
[0046] Label generation:
[0047] Running the data owner tag generation algo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


